• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Outline the Data Protection Act and give examples of breaches.

Extracts from this document...

Introduction

´╗┐MATTHEW ALLEN N5 Data Protection Act What is it? With the growth of information in technology, large databases are needed to hold the huge amounts of information. Global networks are used to share and distribute this information around the world in seconds. In order to control this and to protect people?s right to privacy, the Data Protection Act was introduced in 1984. The 8 basic principles: http://ico.org.uk/for_organisations/data_protection/the_guide/the_principles Data should? 1. Not be transferred to countries that do not have suitable data protection laws - There are similar data protection rules in all European Union countries. It is therefore acceptable to transfer personal data to another EU country, as it will still be protected. However, this principle refers to the European Economic Area (EEA) - this includes Iceland, Norway and Liechtenstein. (http://www.soas.ac.uk/infocomp/dpa/policy/outside/). Others countries, such as the United States, have not got suitable data protection laws either so personal data should not be sent to these countries. ...read more.

Middle

1. Be processed within the rights of data subjects - There are other vital privacy rights, as well as the Data Protection Act. These include the right to confidentiality. These affect how personal information can be used by companies. 1. Be obtained for specified and lawful purposes - This adds that the company must have a specific reason for processing data. Also, the data can only be processed for that purpose and no other. 1. Be adequate, relevant and not excessive for the purpose - This means that companies should collect the right amount of information for the fulfil purpose - no more and no less. In order to check whether they are collecting too much data, they look at the data and consider which pieces of information are absolutely critical in order to enable them to do whatever it is they are trying to do. Whatever is left can't be critical, so it would be unnecessary and it therefore should be disposed of. ...read more.

Conclusion

The forces could be punished under the data protection act. G4S (the security firm) said all files had been deleted, but this will come as no reassurance as they may not be trustworthy. (http://www.bbc.co.uk/news/uk-england-22265315). A statement said the data sent went over what was required, breaching the data protection act’s principles. This is therefore a breach of the act and a criminal investigation will occur as a result – to see who is to blame before action is taken. 1. A GP's receptionist who accessed sensitive medical information about her ex-husband's new wife has admitted breaching data protection law. She was fined £750. The two medical documents she accessed were referred to as highly confidential. www.publicservice.co.uk/news_story.asp?id=22417. Everybody expects their doctors to be confidential but the information was accessed by someone else. The victim of this crime feels betrayed and vulnerable as someone she barely knows, knows private information about her. What has happened can’t be undone and the fine of £750 will only give a small amount of satisfaction – some will feel that the charge was rather lenient. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Child Protection Act.

    Reform to the Child Protection Act For the Child Protection Act to work as well in reality as it does in theory, certain changes need to be made. Those 95% which said that there was not enough funding or enough officers to deal with the cases, 80% of them answered that more funding should be made to aid this problem.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    If her computer is hacked, she can lose important files. It'd be extremely bad, especially as she does her work on her home computer. She can also be the target of identity theft as she keeps her details saved on her computer.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Overall, I believe that the law has been extremely effective in keeping everyone's data personal and secured. The advantages prevail over the disadvantages because with the law in place, a number of events are less likely to commence and even though there are a few drawbacks; without the law their will be more problems then with the law in place.

  2. The Data Protection Act 1998 - questions and answers

    Personal data must be accurate and where necessary kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Personal data must be processed in accordance with the rights of data subjects under the 1998 Act.

  1. Critically evaluate the extent to which it can be said that copyright law gives ...

    You could say that these are bars to allowing protection of their work, because surely every contemporary artist should have the right to protect their work? Why is it then that these tests have been created and have made the law very problematic in determining whether a piece of work should gain copyright?

  2. Data Protection Act

    Also data kept by the school must not be kept longer than necessary. When I leave the school the data should be deleted of the computer as it will no longer be necessary for the school to keep it as I am not there anymore.

  1. Right of privacy under Hong Kong's current laws

    A journalist will face criminal charge(s) if s/he improbably collects or uses one's personal data. The cases Eastweek v. Privacy Commissioner11 and undercover agent case12 has shed some light on the use of DDP: allowing journalists to take photographs of unidentified people, and disallowing them to publish details of undercover agent.

  2. You have to explain how you have looked after the equipment and ensured its ...

    Although there are many viruses (over 2000 to date), the main problems are caused by a handful of familiar ones like; Cascade, Form, Jerusalem, and Stoned. These viruses have been around for a long time; they are well understood and easy to remove by anti-virus software.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work